Professional Documents
Culture Documents
net/publication/229047219
Article
CITATIONS READS
7 275
4 authors, including:
Abdellah Aarab
Sidi Mohamed Ben Abdellah University
82 PUBLICATIONS 422 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by H. Tairi on 26 April 2014.
Abstract: With the increasing amount of digital data sharing tools due to the growth of the internet; thing that increased
the availability of images to the internet users; frauds are multiplied which accentuated the need to find robust marking
techniques for digital data protection. Researches prove that watermarking is a valid solution for such a need. Here, we
propose a robust watermarking technique based on the BEMD (Bidimensional Empirical Mode Decomposition) where
an additive watermarking scheme is applied to each IMF (Intrinsic Mode Function) obtained by the BEMD and the
watermark is a binary matrix differently ponderated for each one of the four first IMFs. The use of the BEMD in
watermarking is motivated by the fact that it has better quality than Fourier, Wavelet and other decomposition
techniques in extracting intrinsic components because of its fully data driven property, and this decomposition is also
proven as a very powerful tool for multi-scale analysis of non stationary and non linear signals and also by the
characteristics of the IMF. All this mean that, our method can be applied to any image. Experimentation has ensured the
mark invisibility, the facility of detection of the mark and the robustness against different kinds of attacks.
Key words: BEMD, JPEG, noise, private watermarking scheme, robustness, Watermarking, Watermark invisibility.
-1-
SETIT2009
Researches proves that the EMD is as better quality The decomposition of images of great size using the
than Fourier, wavelet and other decomposition BEMD can necessitates an important calculation time,
techniques in extracting intrinsic components of so to overcome this problem we can accelerate the
textures and image compression because of its fully process and minimize the computational time by the use
data driven property. This decomposition is also proven of the LBBEMD (Lapped Block Bidimensional
as a very powerful tool for multi-scale analysis of non Empirical Mode Decomposition) [Kar 06].
stationary and non linear signals.
The BEMD is a highly adaptive decomposition. It is 2. Watermark embedding using the BEMD
based on the characterization of the image through its As a first application of image watermarking using
decomposition in intrinsic mode function (IMF) where the IMF after decomposition by BEMD, we will use the
the image can be decomposed into a redundant set of “Patchwork” algorithm; proposed by Bender and Al.
signals denoted IMF and a residue, adding all the IMF’s [Ben 95]. We will apply the additive watermarking
together with the residue reconstructs the original image scheme to each IMF obtained by the BEMD where the
without information loss or distortion. An IMF is watermark is a binary matrix in {- 1, 1} differently
characterized by some specific properties: ponderated for each one of the four first IMFi modes,
• The number of zero crossing and the number of i=1… 4, and at the end watermarked image is
extrema points is equal or differs only by one, reconstructed by adding all the watermarked IMF and
• It has a zero local mean. the residue (Figure 1.). The watermark insertion scheme
is as follow:
Given a 2D signal we can describe the principal Step.1 Decompose the original image to the fourth first
of the empirical mode decomposition as follows: modes and residue:
n
1. Initialisation:
number of IMF);
(the residual) and j (index
I= ∑ IMF + residue
i =1
i with n = 4
2. Extract the jth IMF: Step.2 for each IMF, using a secret private key to select
a. Initialise h0 = rj −1 , i = 1 . randomly a sequence of n couples of
pixels ( Ai , Bi ) in the IMF to be modified lightly in
b. Extract local minima and maxima of h . such a way to increase (or decrease) by a unit the
i −1
c. Compute upper envelope and lower envelope intensity value of the pixels of the type Ai and to
functions xi −1 and yi −1 by interpolating respectively decrease (or increase) by a unit the intensity value
local minima and local maxima of h . of the pixels of the type Bi . In such way there will
i −1
be a unique private key for each IMF.
d. Compute mi −1 = ( xi −1 + yi −1 ) / 2 , the mean envelope. Step.3 Embedding in each IMF the equivalent mark:
e. Update hi = hi −1 − mi −1 and i = i + 1 . IMFwi = IMFi + α i × Ri with i = i...4
f. Calculate stopping criterion ⎧ 1 If pixels are in Ai
⎪
1 k ⎡ (hi ( j −1) ( k ) − hij ( k )) ⎤
2
and R i = ⎨− 1 If pixels are in Bi
SD = ∑⎢ ⎥ ⎪ 0
N k =0 ⎢⎣ hi2( j −1) ( k ) ⎦⎥ ⎩ Others
g. Decision: Repeat steps (b) to (f) until SDi =< ξ , IMF is the original intrinsic mode function,
IMFw is the watermarked intrinsic mode
and then put d i = hi ( jht IMF ) . function, α is a ponderation and R is the binary
3. Update residual rij = rj −1 − m j . watermark matrix
Step.4 Building the watermarked image by adding all
4. Repeat steps 1-3 with j := j + 1 until the number of the watermarked IMF and the residue of the
extrema in rj is less than 2. decomposition of the original image by the BEMD:
n
When the decomposition is complete, we can write
the signal in the following form:
IW = ∑ IMFw
i =1
i + residue with n = 4
K
m( n) = ∑ d k ( n) + r ( n ) , K ∈ N *
k =1
-2-
SETIT2009
-3-
SETIT2009
4.1.2 Detection
We presented in Figure.4. the results of the detection
4. Experimental results of the watermark in the watermarked image. So, to
verify the existence of the mark in the watermarked
4.1 Watermark embedding and detection without image, a measure of correlation between the
attacks
watermarked image after extraction of the watermark
A first application is to test our method for a and the original image is done.
grayscale image (Lena) of 512 x 512 and try to extract
the watermark without any attack on the watermarked
image.
4.1.1 Embedding
In Figure.3. we presented in a) the image before 4.2 Robustness of the method against attacks
insertion of the watermark (original image), in b) the Certainly once watermarked images are diffused in
watermarked image is presented to show the invisibility the internet can beings victim of attacks and arbitrary
of the watermark in the watermarked image and at the transformed. If these attacks do not much degrade the
end in c) the difference (the watermark) between the watermarked image, a robust watermarking method
original image and the watermarked image is presented. should detect the watermark as long as the watermarked
image quality is not rendered useless. So, to test the
It is clear that the first characteristic of a
robustness of our method against attacks, we will
watermarking method which is the invisibility of the
present some examples of attacks/detection.
watermark is respected in our method.
-4-
SETIT2009
-5-
SETIT2009
[Cox 97] I.J. Cox, J. Kilian, F.T. Leighton, and T. Shamoon. [Nun 03] J. C. Nunes, Y. Bouaoune, E. Delechelle, O. Niang,
Secure spread spectrum watermarking for multimedia. Ph. Bunel, Image analysis by bidimensional empirical
IEEE Transactions on Image Processing, 6(12) mode decomposition, Image and Vision Computing
:16731687, 1997. (2003).
[Hua 98] NE. Huang, Z. Shen, SR. Long, MC. Wu, HH. Shih, [Red 05] A. Reddy Adhipathi, B.N. Chatterji, A new wavelet
Q. Zheng, N-C. Yen, CC. Tung, HH. Liu(1998), The based logo-watermarking scheme, Pattern Recognition
empirical mode decomposition and the Hilbert spectrum Letters 26 (2005) 1019–1027.
For non-linear and non-stationary time series analysis,
[San 07] Santa Agreste, Guido Andaloro, A new approach to
Proc R Soc Land Ser A 454:903-995.
pre-processing digital image for wavelet-based watermark,
[Kar 06] M. Karoud, M. A. Sabri, S. J.Andaloussi, H. Tairi and Journal of Computational and Applied Mathematics 210
A. Aarab, Block Image Analysis using Empirical Mode (2007) 13 – 21
Decomposition, journal WSEAS Transactions on
[Yon 08] Yong-Gang Fu, Rui-Min Shen, Color image
Computers. Issue 12, Volume 5, December 2006, P : 2903-
watermarking scheme based on linear discriminant
2911.
analysis, Computer Standards & Interfaces 30 (2008) 115–
[Koc 95] E. Koch and J. Zhao. Towards robust and hidden 120
image copyright labeling. In Proc. of 1995 IEEE Workshop
on Nonlinear Signal and Image Processing, pages 452455,
Halkidiki, Greece, June 1995.
-6-
View publication stats